Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×
OS X

A FreeBSD "Spork" With Touches of NeXT and OS X: NeXTBSD 6

There are a lot of open source operating systems out there; being open source, they lend themselves to forks, clones or near clones, and friendly offshoots. There are even services to let you customize, download, and (if you choose) bulk-install your own OS based on common components. Phoronix notes a new project called NeXTBSD that might turn more heads than most new open source OSes, in part because of the developers behind it, and in part because of the positive thoughts many people have toward the aesthetics of NeXTSTEP and Mac OS X. (And while it might be a fork of FreeBSD, the developers would rather call it a spork, instead.) NeXTBSD was announced last week by Jordan Hubbard and Kip Macy at the Bay Area FreeBSD Users Group (BAFUG). NeXTBSD / FreeBSD X is based on the FreeBSD-CURRENT kernel while adding in Mach IPC, Libdispatch, notifyd, asld, launchd, and other components derived from Apple's open-source code for OS X. The basic launchd/notifyd/asld/libdispatch stack atop their "fork" of FreeBSD is working along with other basic components of their new design. You can watch a recording of the announcement as well as a longer introduction linked from Phoronix's story.
Censorship

Malaysia Blocking Websites Based On Political Content 39

An anonymous reader writes: A few days ago Slashdot carried a piece of news from Malaysia whereby [news] websites based in Malaysia must be registered. Now comes the news that Malaysia is actively blocking websites which carry political opinion contrary to those of the ruling elite. Granted, Malaysia is no US of A nor Europe, but the world must understand that Malaysia is the only country in the world where racial apartheid laws are still being actively practiced — and have received endorsement from the ruling elite which has controlled Malaysia for the past 58 years. (Wikipedia lists some other candidates for modern-day apartheid in its entry on Contemporary segregation.)
Graphics

Do We Need More Emojis? 113

mikejuk writes to note that the Unicode Consortium has accepted 38 new emoji characters as candidates for Unicode 9.0, including characters depicting bacon and a duck."Why could we possibly need a duck? Many of the new characters are the 'other half' of gender-matched pairs, so the Dancer emoji (which is usually rendered as Apple's salsa dancing woman) gets a Man Dancing emoji, who frankly looks like a cross between John Travolta in Saturday Night Fever and your dad at the wedding disco. ... Other additions include carrot, cucumber, and avocado, and bacon. ... The list of additions is rounded off with new animal emojis. Some are the 'missing' zodiac symbols (lion and crab). Others are as baffling as ever – is there *really* a demand for a mallard duck? Sorry: it's in fact a drake!
Graphics

MIAOW Open Source GPU Debuts At Hot Chips 26

alexvoica writes: The first general-purpose graphics processor (GPGPU) now available as open-source RTL was unveiled at the Hot Chips event. Although the GPGPU is in an early and relatively crude stage, it is another piece of an emerging open-source hardware platform, said Karu Sankaralingam, an associate professor of computer science at the University of Wisconsin-Madison. Sankaralingam led the team that designed the Many-core Integrated Accelerator of Wisconsin (MIAOW). A 12-person team developed the MIAOW core in 36 months. Their goal was simply to create a functional GPGPU without setting any specific area, frequency, power or performance goals. The resulting GPGPU uses just 95 instructions and 32 compute units in its current design. It only supports single-precision operations. Students are now adding a graphics pipeline to the design, a job expected to take about six months.
Security

Abusing Symbolic Links Like It's 1999 36

An anonymous reader writes with this snippet from James Forshaw's recent post at Google's Project Zero, which begins For the past couple of years I've been researching Windows elevation of privilege attacks. This might be escaping sandboxing or gaining system privileges. One of the techniques I've used multiple times is abusing the symbolic link facilities of the Windows operating system to redirect privileged code to create files or registry keys to escape the restrictive execution context. Symbolic links in themselves are not vulnerabilities, instead they're useful primitives for exploiting different classes of vulnerabilities such as resource planting or time-of-check time-of-use. Click through that link to see examples of this abuse in action, but also information about how the underlying risks have been (or can be) mitigated.
Censorship

Germany Wants Facebook To Obey Its Rules About Holocaust Denial 456

Bruce66423 writes: In a classic example of the conflict of cultures bought about by the internet, Germany is trying to get Facebook to obey its rules about banning holocaust denial posts. From the linked Jerusalem Post article: [Justice Minister Heiko] Maas, who has accused Facebook of doing too little to thwart racist and hate posts on its social media platform, said that Germany has zero tolerance for such expression and expects the US-based company to be more vigilant. "One thing is clear: if Facebook wants to do business in Germany, then it must abide by German laws," Maas told Reuters. "It doesn't matter that we, because of historical reasons, have a stricter interpretation of freedom of speech than the United States does." "Holocaust denial and inciting racial hatred are crimes in Germany and it doesn't matter if they're posted on Facebook or uttered out in the public on the market square," he added. ... "There's no scope for misplaced tolerance towards internet users who spread racist propaganda. That's especially the case in light of our German history."
Moon

Kristian von Bengston's New Goal: The Moon 23

Kristian von Bengtson, co-founder of DIY manned space program Copenhagen Suborbitals (which he left in 2014) writes with this pithy plug for his newest venture: "This year, we (a great crew) have been preparing for the next adventure with a mission plan going public Oct 1. Go sign up and join the project at moonspike.com." (You may want to check out our video inteview with von Bengston; he's a person who gets things done.)
Cellphones

Ask Slashdot: Best Data Provider When Traveling In the US? 112

An anonymous reader writes: I am visiting USA 3-4 times a year and I need a data service. I also need to keep my cell phone number, so swapping the SIM card in my phone is not an option. I have bought those 19.95$ phones in Best-Buy to get a local number, but those were voice only. So I have been thinking about getting a MiFi hotspot.

I have been looking at pre-paid plans from Verizon(only 700 LTE band for their pre-paid hotspot), AT&T, T-Mobile etc. perhaps to put in a MiFi hotspot or buy a hotspot from a provider, but have no idea which one to use, their reputation, real life coverage etc. It is clear that all data plans in the USA are really expensive, I get 100GB monthly traffic with my Scandinavian provider for the same price as 6-8 GB monthly in the US, which I guess could be a problem with our Apple phones as they do not recognize a metered WiFi hotspot. But that is another issue. I travel all over but most of the time outside the big cities -- and my experience from roaming with my own phone and the cheap local phone so far tells me that coverage fluctuates wildly depending on the operator.
GNOME

GNOME To Start Using Codenames 40

prisoninmate writes: A discussion between GNOME developers and users during the annual GUADEC conference lead to potential code names for the desktop environment, starting with the upcoming September release, GNOME 3.18, which might be dubbed Gothenburg. They decided to codename the September releases after the city where the GUADEC conference took place, as explained above, and the March releases after the city where the GNOME.Asia Summit will take place.
Transportation

Arro Taxi App Arrives In NYC As 'Best Hope' Against Uber 121

An anonymous reader writes with a report at The Stack that "New York City cabs have begun testing a new app-based taxi system in an attempt to win back customers lost to Uber and Lyft." The app is called Arro, and is being trialled in about 7,000 New York cabs. It sticks with metered prices, rather than the demand-based price increases that Uber institutes for times of peak demand. With so many cabs on the road already, the makers boast that Arro will outpace Uber soon. At least based on my limited experience with each, real competition with Uber or Lyft would require some seminars on good customer service.
Science

How Close Are We, Really, To Nuclear Fusion? 323

StartsWithABang writes: The ultimate dream when it comes to clean, green, safe, abundant energy is nuclear fusion. The same process that powers the core of the Sun could also power everything on Earth millions of times over, if only we could figure out how to reach that breakeven point. Right now, we have three different candidates for doing so: inertial confinement, magnetic confinement, and magnetized target fusion. Recent advances have all three looking promising in various ways, making one wonder why we don't spend more resources towards achieving the holy grail of energy.
Displays

A Look At the World's First Virtual Reality Theme Park 14

redletterdave writes: The Void is the first company to create a virtual reality theme park, where virtual experiences are layered on top of physical, real world environments. Tech Insider was the first media outlet to visit The Void's headquarters in Utah, filming the company's first creations. These experiences are still far from final, but the footage is impressive and entertaining. This is not Lazer Tag.
Transportation

Uber Hires Hackers Who Remotely Killed a Jeep 30

An anonymous reader writes: The past several weeks have been rife with major vulnerabilities in modern cars, but none were so dramatic as when Charlie Miller and Chris Valasek tampered with the systems on a moving Jeep Cherokee. Now, Miller and Valasek have left their jobs to join a research laboratory for Uber. It's the same lab that became home for a number of autonomous vehicle experts poached from Carnegie Mellon University. From the article: "As Uber plunges more deeply into developing or adapting self-driving cars, Miller and Valasek could help the company make that technology more secure. Uber envisions autonomous cars that could someday replace its hundreds of thousands of contract drivers. The San Francisco company has gone to top-tier universities and research centers to build up this capability."
Security

Symantec Researchers Find 49 New Modules of Regin Spying Tool 23

itwbennett writes: Security researchers from Symantec have identified 49 more modules (bringing the total number found so far to 75) of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency and its close allies. Some of the modules implement basic malware functions, while other modules are much more specialized and built with specific targets in mind. 'One module was designed to monitor network traffic to Microsoft Internet Information Services (IIS) web servers, another was observed collecting administration traffic for mobile telephony base station controllers, while another was created specifically for parsing mail from Exchange databases,' the Symantec researchers said in an updated version of their white paper (PDF) published Thursday.
Microsoft

Microsoft Builds Open-Source Browser Using HTML, JavaScript, and CSS 70

An anonymous reader writes: Microsoft's new browser, Edge, has a new rendering engine, EdgeHTML. Like Edge, the new rendering engine is only available in Windows 10, but it does more than just power the company's new browser: It's also readily available to developers. To show off what EdgeHTML can do, Microsoft has built a browser using predominantly JavaScript, HTML, and CSS. Next, the company released the browser on the Windows Store and the sample code on GitHub.
Privacy

Ashley Madison CEO Steps Down, Reporter Finds Clues To Hacker's Identity 199

Dave Knott writes: Following the recent hacks on the infidelity website Ashley Madison, Noel Biderman has stepped down as CEO of both AshleyMadison.com and its parent company. Avid Life Media Inc., the company that owns the site and many others, announced Biderman's move in a short press release on Friday: "Noel Biderman, in mutual agreement with the company, is stepping down as chief executive officer of Avid Life Media Inc. (ALM) and is no longer with the company. Until the appointment of a new CEO, the company will be led by the existing senior management team." Before the data hack, the company was planning an IPO in London that would have taken in as much as $200 million from investors. According to regulatory filings, the company had $115 million in revenue last year, more than four times the amount it obtained in 2009.

Meanwhile, in related news, Brian Krebs (the reporter who first uncovered the hack) says he has uncovered clues to the possible identity of the hacker. Krebs says he noticed the Twitter account operated by a known hacker recently posted a link to Ashley Madison's stolen proprietary source code before it was made public. Intrigued by the poster's apparent access, he examined the account's posting history and noticed a predilection for the music of Australian hard rock band AC/DC. This jibes with the behavior of the hacker(s), who had displayed threatening messages on the computers of Ashley Madison employees, accompanied by AC/DC song Thunderstruck. In a series of tweets, the owner of the account, one Thadeus Zu, appears to deny that he was behind the hack, and indeed makes several suggestions that the account itself isn't even run by one person, but is instead an amalgam of like-minded digital vigilantes.
The NY Times also reports that people whose details were contained in the leak are beginning to face threats of blackmail.
Ubuntu

Ubuntu Is the Dominant Cloud OS 161

An anonymous reader writes: According to a new report by Cloud Market, Ubuntu is more than twice as popular on Amazon EC2 as all other operating systems combined. Given that Amazon Web Services has 57% of the public cloud market, Ubuntu is clearly the most popular OS for cloud systems. This is further bolstered by a recent OpenStack survey, which found that more than half of respondents used Ubuntu for cloud-based production environments. Centos was a distant second at 29%, and RHEL came in third at 11%. "In addition to AWS, Ubuntu has been available on HP Cloud, and Microsoft Azure since 2013. It's also now available on Google Cloud Platform, Fujitsu, and Joyent." The article concludes, "People still see Ubuntu as primarily a desktop operating system. It's not — and hasn't been for some time."
The Courts

Federal Court Overturns Ruling That NSA Metadata Collection Was Illegal 143

New submitter captnjohnny1618 writes: NPR is reporting that an appeals court has overturned the decision that found the NSA's bulk data collection to be illegal. "Judges for the District of Columbia court of appeals found that the man who brought the case, conservative lawyer Larry Klayman, could not prove that his particular cellphone records had been swept up in NSA dragnets." The article clarifies that due to the recent passage of new laws governing how metadata is collected, this is of less significance than it would have otherwise been: "If you remember, after a fierce battle, both houses of Congress voted in favor of a law that lets phone companies keep that database, but still allows the government to query it for specific data. The three-judge panel of the United States Court of Appeals for the District of Columbia still decided to take on the case, because that new program doesn't begin until 180 days after the date that law was enacted (June 2, 2015.)" On top of that, the injunction from the earlier ruling never actually went into effect. Still, it seems like an important ruling to me: a government agency was willfully and directly violating the rights of the Americans (and international citizens as well) and now it's just going to get shrugged off?
Shark

Boeing Demonstrates Drone-Killing Laser 121

An anonymous reader writes: Boeing has successfully tested a new weapon system that tracks unmanned aircraft and shoots them down with a laser. The system is surprisingly small — it can be transported in a few medium-sized boxes, and two techs can set it up in minutes. The laser needs just a few seconds of continuous [contact] to set a drone aflame, and the tracking gimbal is precise enough to target specific parts of a drone. "Want to zap the tail so it crashes and then you can go retrieve the mostly intact drone and see who is trying to spy on you? Can do. Think it's carrying explosives and you want to completely destroy it? No problem." The laser is controlled with custom targeting software that runs on a laptop, with help from an Xbox 360 controller. Boeing expects the laser system to be ready for sale in the next year or two.
Privacy

German Intelligence Traded Citizen Data For NSA Surveillance Software 66

An anonymous reader sends news that Germany's domestic intelligence agency, the BfV, was so impressed with the NSA's surveillance software that they were willing to "share all data relevant to the NSA's mission" in order to get it. "The data in question is regularly part of the approved surveillance measures carried out by the BfV. In contrast, for example, to the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency, the BfV does not use a dragnet to collect huge volumes of data from the Internet. Rather, it is only allowed to monitor individual suspects in Germany -- and only after a special parliamentary commission has granted approval. ... Targeted surveillance measures are primarily intended to turn up the content of specific conversations, in the form of emails, telephone exchanges or faxes. But along the way, essentially as a side effect, the BfV also collects mass quantities of so-called metadata. Whether the collection of this data is consistent with the restrictions outlined in Germany's surveillance laws is a question that divides legal experts."